Londonchiropracter.com

This domain is available to be leased

Menu
Menu

REvil’s humungous $70M Kaseya ransomware attack, explained

Posted on July 5, 2021 by admin

Last Friday was quite a doozy in the cybersecurity world: a Russia-linked REvil ransomware gang is believed to be behind a massive ‘supply chain’ attack that crippled hundreds of businesses across the US and elsewhere. Now, the group wants $70 million in exchange for a tool to decrypt the files they’ve locked on victims’ networks.

The Record’s Catalin Cimpanu reported that REvil has claimed responsibility for the attack and put out the call for the enormous ransom. If paid, it would make this the largest ransomware incident in history.

At the same time, US President Biden said on Sunday “we’re not certain” who was behind the attack, and he’s directed intelligence agencies to investigate.

How did this happen?

Last week’s attack targeted VSA, a piece of software developed by an American IT management software company called Kesaya. VSA is a tool used to remotely manage an organization’s servers and other hardware, as well as software and services.

VSA is used by large corporations, as well as service providers who manage system administration for smaller companies that don’t have their own IT departments.

Kaseya VSA Network Toplogy View
Kesaya’s VSA software allows managed service providers to remotely oversee their clients’ IT networks.

Per The Record, malware analyst Mark Loman (from security software company Sophos) noted that a malicious VSA update hit multiple systems where this tool was being used. Then, it was deployed to all connected client computers and servers.

Subsequently, this is said to allow the REvil gang to disable local antivirus, and run a fake Windows Defender app which is actually the ransomware in disguise. The ransomware then does what it’s known for, and encrypts the files on the infected computer so they can’t be accessed without a key.

This is an example of what’s called a supply chain attack, where malicious code is injected into a trusted piece of software that affects other parts of the target’s network — or even a large number of targets that all use said software.

How bad is it?

Sophos noted on July 2 that “more than 70 managed service providers were impacted, resulting in more than 350 further impacted organizations.” The REvil gang noted on its dark web blog that more than a million systems were infected.

Among them is Coop, a Swedish supermarket chain. The company has temporarily closed some 800 of its stores across the country as a result of the attack which has impacted its cash registers.

Swedish supermarket chain Coop has had to temporarily close 800 of its stores as a result of the attack. Image via Coop
Swedish supermarket chain Coop has had to temporarily close 800 of its stores as a result of the attack. Image via Coop

This incident is believed to be one of the largest supply chain attacks of all time.

REvil is the name of a ransomware-as-a-service (RaaS) operation. Affiliated cybercriminals utilize REvil’s malware target companies, like managed service providers, lock their clients’ files, and demand a ransom. The developers behind REvil are believed to be in, from, or linked to Russia.

REvil has previously been used to swipe device schematics from Apple supplier Quanta Computer, and the actors behind the attack threatened to release the documents unless paid a ransom of $50 million. Strangely, they mysteriously removed references to that incident a week later. REvil was also responsible for a breach of Acer’s systems recently. And last month, when US-based meat supplier JBS was hit by REvil, the company paid out $11 million to recover access to its systems.

Can we fix it?

Kaseya’s first step to mitigate damage was to instruct its clients to take its VSA servers offline.

CEO Fred Voccola told CRN that the company is working to resolve the situation. It is currently pen-testing a patch for VSA, so it should be able to help its clients get back online soon. However, it’s not clear if that will also take care of the problem of locked files.

Voccola also said, “The technical teams are working with them [impacted MSPs] around the clock. We’re helping them from a legal perspective. We’re helping them deal with with the authorities, whether it’s federal or state. We’re helping them navigate with their insurance providers.”

What’s next?

It remains to be seen how Kesaya and its clients will navigate this. There’s the matter of the $70 million decryption tool that could solve the problem at hand. However, the US FBI has previously discouraged victims from paying up. Sage advice, considering that according to a Sophos report from this year, 92% of organizations that do pay are unable to recover all their data; most victims who cough up the cash are only able to partially recover the contents of their encrypted files.

Source

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • LG Electronics and Nvidia are in talks on robotics, AI data centres, and mobility
  • Sequoia is giving away the hardware for an AI project it cannot invest in. That is the point.
  • Trump says Anthropic Pentagon deal is ‘possible’, weeks after blacklisting the company as a national security risk
  • Samsung and IKEA just made the $6 smart home real, and your TV is already the hub
  • OpenAI recruits Cognizant and CGI to take Codex into enterprise software shops worldwide

Recent Comments

    Archives

    • April 2026
    • March 2026
    • February 2026
    • January 2026
    • December 2025
    • September 2025
    • August 2025
    • July 2025
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020

    Categories

    • Uncategorized

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    ©2026 Londonchiropracter.com | Design: Newspaperly WordPress Theme